Skip to main content

Showing 1–11 of 11 results for author: Fahl, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20785  [pdf, other

    cs.CR cs.CY

    How the Future Works at SOUPS: Analyzing Future Work Statements and Their Impact on Usable Security and Privacy Research

    Authors: Jacques Suray, Jan H. Klemmer, Juliane Schmüser, Sascha Fahl

    Abstract: Extending knowledge by identifying and investigating valuable research questions and problems is a core function of research. Research publications often suggest avenues for future work to extend and build upon their results. Considering these suggestions can contribute to develo** research ideas that build upon previous work and produce results that tie into existing knowledge. Usable security… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

    Comments: 16 pages, 4 figures, 2 tables

  2. arXiv:2405.06371  [pdf, other

    cs.CR cs.SE

    Using AI Assistants in Software Development: A Qualitative Study on Security Practices and Concerns

    Authors: Jan H. Klemmer, Stefan Albert Horstmann, Nikhil Patnaik, Cordelia Ludden, Cordell Burton Jr, Carson Powers, Fabio Massacci, Akond Rahman, Daniel Votipka, Heather Richter Lipford, Awais Rashid, Alena Naiakshina, Sascha Fahl

    Abstract: Following the recent release of AI assistants, such as OpenAI's ChatGPT and GitHub Copilot, the software industry quickly utilized these tools for software development tasks, e.g., generating code or consulting AI for advice. While recent research has demonstrated that AI-generated code can contain security issues, how software professionals balance AI assistant usage and security remains unclear.… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: 20 pages, 2 figures, 3 tables

  3. "Make Them Change it Every Week!": A Qualitative Exploration of Online Developer Advice on Usable and Secure Authentication

    Authors: Jan H. Klemmer, Marco Gutfleisch, Christian Stransky, Yasemin Acar, M. Angela Sasse, Sascha Fahl

    Abstract: Usable and secure authentication on the web and beyond is mission-critical. While password-based authentication is still widespread, users have trouble dealing with potentially hundreds of online accounts and their passwords. Alternatives or extensions such as multi-factor authentication have their own challenges and find only limited adoption. Finding the right balance between security and usabil… ▽ More

    Submitted 26 November, 2023; v1 submitted 1 September, 2023; originally announced September 2023.

    Comments: Extended version of the paper that appeared at ACM CCS 2023. 18 pages (+2 pages artifact appendix), 4 figures, 11 tables

  4. arXiv:2306.09708  [pdf, other

    cs.CR

    "We've Disabled MFA for You": An Evaluation of the Security and Usability of Multi-Factor Authentication Recovery Deployments

    Authors: Sabrina Amft, Sandra Höltervennhoff, Nicolas Huaman, Alexander Krause, Lucy Simko, Yasemin Acar, Sascha Fahl

    Abstract: Multi-Factor Authentication is intended to strengthen the security of password-based authentication by adding another factor, such as hardware tokens or one-time passwords using mobile apps. However, this increased authentication security comes with potential drawbacks that can lead to account and asset loss. If users lose access to their additional authentication factors for any reason, they will… ▽ More

    Submitted 19 September, 2023; v1 submitted 16 June, 2023; originally announced June 2023.

  5. arXiv:2211.06213  [pdf, other

    cs.CR

    Committed by Accident: Studying Prevention and Remediation Strategies Against Secret Leakage in Source Code Repositories

    Authors: Alexander Krause, Jan H. Klemmer, Nicolas Huaman, Dominik Wermke, Yasemin Acar, Sascha Fahl

    Abstract: Version control systems for source code, such as Git, are key tools in modern software development environments. Many developers use online services, such as GitHub or GitLab, for collaborative software development. While software projects often require code secrets to work, such as API keys or passwords, they need to be handled securely within the project. Previous research and news articles have… ▽ More

    Submitted 14 November, 2022; v1 submitted 11 November, 2022; originally announced November 2022.

  6. arXiv:2208.11581  [pdf, other

    cs.CR

    "Please help share!": Security and Privacy Advice on Twitter during the 2022 Russian Invasion of Ukraine

    Authors: Juliane Schmüser, Noah Wöhler, Harshini Sri Ramulu, Christian Stransky, Dominik Wermke, Sascha Fahl, Yasemin Acar

    Abstract: The Russian Invasion of Ukraine in early 2022 resulted in a rapidly changing (cyber) threat environment. This changing environment incentivized the sharing of security advice on social media, both for the Ukrainian population, as well as against Russian cyber attacks at large. Previous research found a significant influence of online security advice on end users. We collected 8,920 tweets posted… ▽ More

    Submitted 24 August, 2022; originally announced August 2022.

    Comments: 18 pages, 2 figures

  7. arXiv:2203.11387  [pdf, other

    cs.HC

    Privacy Rarely Considered: Exploring Considerations in the Adoption of Third-Party Services by Websites

    Authors: Christine Utz, Sabrina Amft, Martin Degeling, Thorsten Holz, Sascha Fahl, Florian Schaub

    Abstract: Modern websites frequently use and embed third-party services to facilitate web development, connect to social media, or for monetization. This often introduces privacy issues as the inclusion of third-party services on a website can allow the third party to collect personal data about the website's visitors. While the prevalence and mechanisms of third-party web tracking have been widely studied,… ▽ More

    Submitted 4 October, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

    Comments: 25 pages, 8 figures, 7 tables

  8. (Un)informed Consent: Studying GDPR Consent Notices in the Field

    Authors: Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, Thorsten Holz

    Abstract: Since the adoption of the General Data Protection Regulation (GDPR) in May 2018 more than 60 % of popular websites in Europe display cookie consent notices to their visitors. This has quickly led to users becoming fatigued with privacy notifications and contributed to the rise of both browser extensions that block these banners and demands for a solution that bundles consent across multiple websit… ▽ More

    Submitted 22 October, 2019; v1 submitted 5 September, 2019; originally announced September 2019.

    Comments: 18 pages, 6 figures, 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19), November 11-15, 2019, London, United Kingdom

  9. arXiv:1801.02742  [pdf, other

    cs.CR

    A Large Scale Investigation of Obfuscation Use in Google Play

    Authors: Dominik Wermke, Nicolas Huaman, Yasemin Acar, Brad Reaves, Patrick Traynor, Sascha Fahl

    Abstract: Android applications are frequently plagiarized or repackaged, and software obfuscation is a recommended protection against these practices. However, there is very little data on the overall rates of app obfuscation, the techniques used, or factors that lead to developers to choose to obfuscate their apps. In this paper, we present the first comprehensive analysis of the use of and challenges to s… ▽ More

    Submitted 20 February, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

  10. arXiv:1712.08940  [pdf, other

    cs.CR

    Studying the Impact of Managers on Password Strength and Reuse

    Authors: Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Sven Bugiel, Michael Backes

    Abstract: Despite their well-known security problems, passwords are still the incumbent authentication method for virtually all online services. To remedy the situation, end-users are very often referred to password managers as a solution to the password reuse and password weakness problems. However, to date the actual impact of password managers on password security and reuse has not been studied systemati… ▽ More

    Submitted 24 December, 2017; originally announced December 2017.

    Comments: 20 pages

  11. arXiv:1710.03135  [pdf, other

    cs.CR

    Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security

    Authors: Felix Fischer, Konstantin Böttinger, Huang Xiao, Christian Stransky, Yasemin Acar, Michael Backes, Sascha Fahl

    Abstract: Online programming discussion platforms such as Stack Overflow serve as a rich source of information for software developers. Available information include vibrant discussions and oftentimes ready-to-use code snippets. Anecdotes report that software developers copy and paste code snippets from those information sources for convenience reasons. Such behavior results in a constant flow of community-… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.